Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-10-24CybereasonAssaf Dahan, Cybereason Nocturnus, Lior Rochberger
Hunting Raccoon: The new Masked Bandit on the Block
Raccoon
2019-10-24CybereasonAssaf Dahan, Cybereason Nocturnus, Lior Rochberger
Hunting Raccoon: The new Masked Bandit on the Block
Raccoon
2019-10-24CybereasonAssaf Dahan, Cybereason Nocturnus, Lior Rochberger
Hunting Raccoon: The new Masked Bandit on the Block
Raccoon
2019-06-25CybereasonCybereason Nocturnus
OPERATION SOFT CELL: A WORLDWIDE CAMPAIGN AGAINST TELECOMMUNICATIONS PROVIDERS
CHINACHOPPER HTran MimiKatz Poison Ivy Operation Soft Cell
2019-06-13CybereasonAmit Serper, Mary Zhao
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
Unidentified Linux 001
2019-06-13CybereasonAmit Serper, Mary Zhao
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
Unidentified Linux 001
2019-04-25CybereasonCybereason Nocturnus
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
ServHelper TA505
2019-04-02CybereasonLior Rochberger, Matan Zatz, Noa Pinkas
Triple Threat: Emotet Deploys Trickbot to Steal Data & Spread Ryuk
Ryuk TrickBot
2019-04-02CybereasonLior Rochberger, Matan Zatz, Noa Pinkas
Triple Threat: Emotet Deploys Trickbot to Steal Data & Spread Ryuk
Ryuk TrickBot
2019-04-02CybereasonLior Rochberger, Matan Zatz, Noa Pinkas
Triple Threat: Emotet Deploys Trickbot to Steal Data & Spread Ryuk
Ryuk TrickBot
2019-03-12CybereasonAssaf Dahan, Cybereason Nocturnus
New Ursnif Variant targets Japan packed with new Features
ISFB UrlZone
2019-03-12CybereasonAssaf Dahan, Cybereason Nocturnus
New Ursnif Variant targets Japan packed with new Features
ISFB UrlZone
2019-02-13CybereasonEli Salem
Astaroth Malware Uses Legitimate OS and Antivirus Processes to Steal Passwords and Personal Data
Astaroth
2019-01-03CybereasonEli Salem, Lior Rochberger, Niv Yona
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
sLoad
2019-01-03CybereasonEli Salem, Lior Rochberger, Niv Yona
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
sLoad
2019-01-03CybereasonEli Salem, Lior Rochberger, Niv Yona
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
sLoad
2018-10-03CybereasonAssaf Dahan
New Betabot campaign under the microscope
BetaBot
2018-09-18CybereasonCybereason Nocturnus
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE
Overlay RAT
2018-09-14CybereasonAmit Serper
Wannamine cryptominer that uses EternalBlue still active
WannaMine
2017-07-12CybereasonIsrael Barak
Operation Escalation: How click-fraud malware transforms into an advanced threat
Kovter
2017-05-24CybereasonAssaf Dahan
Operation Cobalt Kitty: A large-scale APT in Asia carried out by the OceanLotus Group
APT32
2017-05-10CybereasonAmit Serper
Proton.B: What this Mac malware actually does
Proton RAT
2017-04-25CybereasonAssaf Dahan
ShadowWali: New variant of the xxmm family of backdoors
xxmm
2017-01-01CybereasonAmit Serper
OSX Pirrit: Part III
Pirrit
2016-04-06CybereasonAmit Serper
OSX Pirrit: What adware that 'just' displays ads means for Mac OS X security
Pirrit